Personal information

No personal information available

Activities

Employment (1)

Universität zu Lübeck: Lübeck, Schleswig-Holstein, DE

2017-08-01 to present | Professor (Institute for IT Security)
Employment
Source: Self-asserted source
Thomas Eisenbarth

Works (50 of 114)

Items per page:
Page 1 of 3

Duplication-Based Fault Tolerance for RISC-V Embedded Software

Lecture Notes in Computer Science
2024 | Book chapter
Part of ISBN: 9783031709029
Part of ISBN: 9783031709036
Part of ISSN: 0302-9743
Part of ISSN: 1611-3349
Contributors: Volodymyr Bezsmertnyi; Jean-Michel Cioranesco; Thomas Eisenbarth
Source: Self-asserted source
Thomas Eisenbarth

SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution)

Lecture Notes in Computer Science
2024 | Book chapter
Part of ISBN: 9783031572555
Part of ISBN: 9783031572562
Part of ISSN: 0302-9743
Part of ISSN: 1611-3349
Contributors: Nils Loose; Felix Mächtle; Florian Sieck; Thomas Eisenbarth
Source: Self-asserted source
Thomas Eisenbarth

SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection

2024-07-30 | Conference paper
Contributors: Georg Becker; Thomas Eisenbarth; Hannes Federrath; Mathias Fischer; Nils Loose; Simon Ott; Joana Pecholt; Stephan Marwedel; Dominik Meyer; Jan Stijohann et al.
Source: check_circle
Crossref

Polynomial sharings on two secrets: Buy one, get one free

IACR Transactions on Cryptographic Hardware and Embedded Systems
2024-07-18 | Journal article
Part of ISSN: 2569-2925
Contributors: Paula Arnold; Sebastian Berndt; Thomas Eisenbarth; Maximilian Orlt
Source: Self-asserted source
Thomas Eisenbarth

Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments

2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P)
2024-07-08 | Conference paper
Contributors: Debopriya Roy Dipta; Thore Tiemann; Berk Gulmezoglu; Eduard Marin; Thomas Eisenbarth
Source: Self-asserted source
Thomas Eisenbarth

Obelix: Mitigating Side-Channels Through Dynamic Obfuscation

2024 IEEE Symposium on Security and Privacy (SP)
2024-05-19 | Conference paper
Contributors: Jan Wichelmann; Anja Rabich; Anna Pätschke; Thomas Eisenbarth
Source: Self-asserted source
Thomas Eisenbarth

'Act natural!': Exchanging Private Messages on Public Blockchains

Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023
2023 | Conference paper
EID:

2-s2.0-85168158446

Contributors: Tiemann, T.; Berndt, S.; Eisenbarth, T.; Liśkiewicz, M.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software

32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023
2023 | Conference paper
URI:

https://www.usenix.org/conference/usenixsecurity23/presentation/wichelmann

Contributors: Jan Wichelmann and Anna Pätschke and Luca Wilke and Thomas Eisenbarth; Joseph A. Calandrino and Carmela Troncoso
Source: Self-asserted source
Thomas Eisenbarth

Combined Fault and Leakage Resilience: Composability, Constructions and Compiler

Lecture Notes in Computer Science
2023 | Book chapter
Part of ISBN: 9783031385476
Part of ISBN: 9783031385483
Part of ISSN: 0302-9743
Part of ISSN: 1611-3349
Contributors: Sebastian Berndt; Thomas Eisenbarth; Sebastian Faust; Marc Gourjon; Maximilian Orlt; Okan Seker
Source: Self-asserted source
Thomas Eisenbarth

Madvex: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2023 | Book
EID:

2-s2.0-85164264655

Part of ISSN: 16113349 03029743
Contributors: Loose, N.; Mächtle, F.; Pott, C.; Bezsmertnyi, V.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

MAMBO–V: Dynamic Side-Channel Leakage Analysis on RISC–V

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2023 | Book
EID:

2-s2.0-85164250851

Part of ISSN: 16113349 03029743
Contributors: Wichelmann, J.; Peredy, C.; Sieck, F.; Pätschke, A.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Subversion-Resilient Authenticated Encryption Without Random Oracles

Lecture Notes in Computer Science
2023 | Book chapter
Part of ISBN: 9783031334900
Part of ISBN: 9783031334917
Part of ISSN: 0302-9743
Part of ISSN: 1611-3349
Contributors: Pascal Bemmann; Sebastian Berndt; Denis Diemert; Thomas Eisenbarth; Tibor Jager
Source: Self-asserted source
Thomas Eisenbarth

SEV-Step A Single-Stepping Framework for AMD-SEV

IACR Transactions on Cryptographic Hardware and Embedded Systems
2023-12-04 | Journal article
Part of ISSN: 2569-2925
Contributors: Luca Wilke; Jan Wichelmann; Anja Rabich; Thomas Eisenbarth
Source: Self-asserted source
Thomas Eisenbarth

TeeJam: Sub-Cache-Line Leakages Strike Back

IACR Transactions on Cryptographic Hardware and Embedded Systems
2023-12-04 | Journal article
Part of ISSN: 2569-2925
Contributors: Florian Sieck; Zhiyuan Zhang; Sebastian Berndt; Chitchanok Chuengsatiansup; Thomas Eisenbarth; Yuval Yarom
Source: Self-asserted source
Thomas Eisenbarth

SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?

2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)
2023-10-28 | Conference paper
Contributors: Andrija Nešković; Saleh Mulhem; Alexander Treff; Rainer Buchty; Thomas Eisenbarth; Mladen Berekovic
Source: Self-asserted source
Thomas Eisenbarth

IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems

2023-07-10 | Conference paper
Contributors: Thore Tiemann; Zane Weissman; Thomas Eisenbarth; Berk Sunar
Source: check_circle
Crossref

Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs

2023-04-24 | Conference paper
Contributors: Claudius Pott; Berk Gulmezoglu; Thomas Eisenbarth
Source: check_circle
Crossref

A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP

Proceedings - IEEE Symposium on Security and Privacy
2022 | Conference paper
EID:

2-s2.0-85135909950

Part of ISSN: 10816011
Contributors: Li, M.; Wilke, L.; Wichelmann, J.; Eisenbarth, T.; Teodorescu, R.; Zhang, Y.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

ASAP: Algorithm Substitution Attacks on Cryptographic Protocols

ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
2022 | Conference paper
EID:

2-s2.0-85133160830

Contributors: Berndt, S.; Wichelmann, J.; Pott, C.; Traving, T.-H.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications

Proceedings of the ACM Conference on Computer and Communications Security
2022 | Conference paper
EID:

2-s2.0-85143067391

Part of ISSN: 15437221
Contributors: Wichelmann, J.; Sieck, F.; Pätschke, A.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level

Proceedings - Design Automation Conference
2021 | Conference paper
EID:

2-s2.0-85117468653

Part of ISSN: 0738100X
Contributors: Muller, J.; Fadiheh, M.R.; Anton, A.L.D.; Eisenbarth, T.; Stoffel, D.; Kunz, W.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

A white-box masking scheme resisting computational and algebraic attacks

IACR Transactions on Cryptographic Hardware and Embedded Systems
2021 | Journal article
EID:

2-s2.0-85111446811

Part of ISSN: 25692925
Contributors: Seker, O.; Eisenbarth, T.; Liśkiewicz, M.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Aim, wait, shoot: How the CacheSniper technique improves unprivileged cache attacks

Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021
2021 | Conference paper
EID:

2-s2.0-85119273589

Contributors: Briongos, S.; Bruhns, I.; Malagón, P.; Eisenbarth, T.; Moya, J.M.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Differential Power Analysis of the Picnic Signature Scheme

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2021 | Book
EID:

2-s2.0-85112725786

Part of ISSN: 16113349 03029743
Contributors: Gellersen, T.; Seker, O.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Help, My Signal has Bad Device!: Breaking the Signal Messenger’s Post-Compromise Security Through a Malicious Device

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2021 | Book
EID:

2-s2.0-85112255994

Part of ISSN: 16113349 03029743
Contributors: Wichelmann, J.; Berndt, S.; Pott, C.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Nano Security: From Nano-Electronics to Secure Systems

Proceedings -Design, Automation and Test in Europe, DATE
2021 | Conference paper
EID:

2-s2.0-85111026211

Part of ISSN: 15301591
Contributors: Polian, I.; Altmann, F.; Arul, T.; Boit, C.; Brederlow, R.; Davi, L.; Drechsler, R.; Du, N.; Eisenbarth, T.; Guneysu, T. et al.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Side-channel protections for picnic signatures

IACR Transactions on Cryptographic Hardware and Embedded Systems
2021 | Journal article
EID:

2-s2.0-85118420573

Part of ISSN: 25692925
Contributors: Aranha, D.F.; Berndt, S.; Eisenbarth, T.; Seker, O.; Takahashi, A.; Wilke, L.; Zaverucha, G.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

UndeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation

Proceedings - 2021 IEEE Symposium on Security and Privacy Workshops, SPW 2021
2021 | Conference paper
EID:

2-s2.0-85112791482

Contributors: Wilke, L.; Wichelmann, J.; Sieck, F.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Util::Lookup: Exploiting Key Decoding in Cryptographic Libraries

Proceedings of the ACM Conference on Computer and Communications Security
2021 | Conference paper
EID:

2-s2.0-85119328298

Part of ISSN: 15437221
Contributors: Sieck, F.; Berndt, S.; Wichelmann, J.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Jackhammer: Efficient rowhammer on heterogeneous FPGA-CPU platforms

IACR Transactions on Cryptographic Hardware and Embedded Systems
2020 | Journal article
EID:

2-s2.0-85107678694

Part of ISSN: 25692925
Contributors: Weissman, Z.; Tiemann, T.; Moghimi, D.; Custodio, E.; Eisenbarth, T.; Sunar, B.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Microarchitectural Isolation Guarantees through Execution Based Signatures

2020 35th Conference on Design of Circuits and Integrated Systems, DCIS 2020
2020 | Conference paper
EID:

2-s2.0-85098621728

Contributors: Briongos, S.; Malagon, P.; Moya, J.M.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

RELOAD+REFRESH: Abusing cache replacement policies to perform stealthy cache attacks

Proceedings of the 29th USENIX Security Symposium
2020 | Conference paper
EID:

2-s2.0-85091892695

Contributors: Briongos, S.; Malagón, P.; Moya, J.M.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

SEVurity: No security without integrity: Ng integrity-free memory encryption with minimal assumptions

Proceedings - IEEE Symposium on Security and Privacy
2020 | Conference paper
EID:

2-s2.0-85091599442

Part of ISSN: 10816011
Contributors: Wilke, L.; Wichelmann, J.; Morbitzer, M.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis

Proceedings of the ACM Conference on Computer and Communications Security
2020 | Conference paper
EID:

2-s2.0-85096185758

Part of ISSN: 15437221
Contributors: Seker, O.; Berndt, S.; Wilke, L.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

TPM-FAIL: TPM meets timing and lattice attacks

Proceedings of the 29th USENIX Security Symposium
2020 | Conference paper
EID:

2-s2.0-85089216733

Contributors: Moghimi, D.; Sunar, B.; Eisenbarth, T.; Heninger, N.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes

ACM International Conference Proceeding Series
2019 | Conference paper
EID:

2-s2.0-85125857938

Contributors: Inci, M.S.; Eisenbarth, T.; Sunar, B.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

IT security in Lübeck - The design of a modern and future-proof security curriculum

2018 12th European Workshop on Microelectronics Education, EWME 2018
2019 | Conference paper
EID:

2-s2.0-85062862871

Contributors: Stelzner, M.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations

International Journal of Parallel Programming
2019 | Journal article
EID:

2-s2.0-85056346003

Contributors: Moghimi, A.; Wichelmann, J.; Eisenbarth, T.; Sunar, B.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Spoiler: Speculative load hazards boost rowhammer and cache attacks

Proceedings of the 28th USENIX Security Symposium
2019 | Conference paper
EID:

2-s2.0-85075943111

Contributors: Islam, S.; Moghimi, A.; Bruhns, I.; Krebbel, M.; Gulmezoglu, B.; Eisenbarth, T.; Sunar, B.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Undermining user privacy on mobile devices using AI

AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
2019 | Conference paper
EID:

2-s2.0-85069971236

Contributors: Gulmezoglu, B.; Zankl, A.; Tol, M.C.; Islam, S.; Eisenbarth, T.; Sunar, B.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Cacheshield: Detecting cache attacks through self-observation

CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
2018 | Conference paper
EID:

2-s2.0-85052024183

Contributors: Briongos, S.; Malagón, P.; Irazoqui, G.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Identifying and Eliminating Side-Channel Leaks in Programmable Systems

IEEE Design and Test
2018 | Journal article
EID:

2-s2.0-85032449697

Contributors: De Mulder, E.; Eisenbarth, T.; Schaumont, P.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

MASCAT: Preventing microarchitectural attacks before distribution

CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
2018 | Conference paper
EID:

2-s2.0-85052020905

Contributors: Irazoqui, G.; Eisenbarth, T.; Sunar, B.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX

2018 | Book chapter
Contributors: Ahmad Moghimi; Thomas Eisenbarth; Berk Sunar
Source: check_circle
Crossref

MicroWalk: A framework for finding side channels in binaries

ACM International Conference Proceeding Series
2018 | Conference paper
EID:

2-s2.0-85060061888

Contributors: Wichelmann, J.; Eisenbarth, T.; Moghimi, A.; Sunar, B.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks

IACR Transactions on Cryptographic Hardware and Embedded Systems
2018-08-16 | Journal article
Source: Self-asserted source
Thomas Eisenbarth

CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks

IACR Transactions on Cryptographic Hardware and Embedded Systems
2018-05-08 | Journal article
Source: Self-asserted source
Thomas Eisenbarth

A honeypot system for wearable networks

37th IEEE Sarnoff Symposium, Sarnoff 2016
2017 | Conference paper
EID:

2-s2.0-85015230006

Contributors: Leonard, A.M.; Cai, H.; Venkatasubramanian, K.K.; Ali, M.; Eisenbarth, T.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think

26th USENIX Security Symposium (USENIX Security 17)
2017 | Conference paper
Part of ISBN: 978-1-931971-40-9
EID:

2-s2.0-85056716145

Source: Self-asserted source
Thomas Eisenbarth
grade
Preferred source (of 2)‎

Cache-based application detection in the cloud using machine learning

ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
2017 | Conference paper
EID:

2-s2.0-85022048498

Contributors: Gulmezoglu, B.; Eisenbarth, T.; Sunar, B.
Source: Self-asserted source
Thomas Eisenbarth via Scopus - Elsevier
Items per page:
Page 1 of 3